Explain cpu based exchange, Computer Engineering

Assignment Help:

Explain CPU based exchange.

CPU Based Exchange: All the control equipment is replaced with a single processor that must be quite powerful, in centralized control. This should be able of processing 10 to 100 calls per second, depending upon the load on the system, and performing simultaneously of many other ancillary tasks. A usual control configuration of an ESS by using centralized SPC is demonstrated in figure. A centralized SPC configuration may utilize more than one processor for redundancy reasons. Though, there are a large number of services that can be offered by CPU based exchange, they might be grouped under four wide categories.

1157_Typically CPU Based Exchange.png

FIG - Typically CPU Based Exchange

1. Services related with the calling subscribers and designed to decrease the number of dialing errors and the time spent on dialing.

2. Services related with the called subscriber and designed to raise the call completion rate.

3. Services including more than two parties.

4. Various types of services.

These new services are termed as supplementary services and several of the prominent ones are given below as:

 Category 1:

  • Recorded number calls or no dialing calls
  • Abbreviated dialing
  • Call back while free.

Category 2:

  • Operator answer.
  • Call forwarding

Category 3:

  • Call waiting
  • Calling number record
  • Conference calls.
  • Consultation hold

Category 4:

  • STD barring
  • Automatic alarm
  • Malicious call tracing

Issues commands of a subscriber to an exchange to deactivate or activate a service, record or solicit an acknowledgement or clear data in the subscriber line data area from the exchange. As an illustration, a user may enable or disable STD service on his line by using a command. A command may be or not have data related with this. The number of digits in the data, while present, may vary depending on the command. As an effect, subscriber commands are designed to be of variable length requiring the use of an end-of-command symbol.


Related Discussions:- Explain cpu based exchange

Create new user account - system administrator, A common task for a system ...

A common task for a system administrator is to create new user accounts. In this lab you will be creating output that looks like an /etc/passwd file. The Problem You are to

What is error detection code, What is Error detection code? It is a bin...

What is Error detection code? It is a binary code that notice digital errors during transmission. The detected errors cannot be correct but the presence is shown.

What is sensitivity list, What is sensitivity list? A list of signals w...

What is sensitivity list? A list of signals which trigger execution of the block when they change value. Sensitivity list  indicates that when a change occurs to any one of

Multi-layer artificial neural networks, Multi-Layer Artificial Neural Netwo...

Multi-Layer Artificial Neural Networks - Artificial intelligence: Now we can look at more sophisticated ANNs, which are known multi-layer artificial neural networks because the

Explain optimization process of pipelining, Q. Explain Optimization process...

Q. Explain Optimization process of Pipelining ? RISC machines can use a very efficient pipeline scheme due to the regular and simple instructions. Similarly all other instructi

Function makestk-predicate function emptystk, 1. Create the following ADTs....

1. Create the following ADTs. (a) Write the constructor function makestk, predicate function emptystk and mutator functions pushstk and popstk: i. makestk returns a new stack

What is telnet explain, Q. What is Telnet explain? TELNET stands for TE...

Q. What is Telnet explain? TELNET stands for TErminal NETwork. Telnet is both a protocol for connecting a local computer to a remote computer and a TCP/IP application. Telnet i

Full form of www, What do you understand by WWW WWW: The World Wide ...

What do you understand by WWW WWW: The World Wide is an architectural framework for accessing linked documents increase out over thousands of machines all over the world. It

How do stubs work in a weblogic server cluster, Clients that join to a WebL...

Clients that join to a WebLogic Server cluster and look up a clustered object get a replica-aware stub for the object. This stub haves the list of available server instances that h

Define about EMS, Define EMS The area at location C8000H-DFFFFFH is oft...

Define EMS The area at location C8000H-DFFFFFH is often free oropen. This area is used for the expanded memory system in a XT or PC system, or for the upper memory system in an

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd